Download presentation
Presentation is loading. Please wait.
Published byRolf Stevens Modified over 9 years ago
1
IIW 2008b Report November 10-12 2008, Mountain View www.oasis-open.org Abbie Barbir (abbieb@nortel.com)abbieb@nortel.com Nortel OASIS IDtrust Steering Committee
2
IIW 2008 Take home points..1 Many interactive and important session were proposed covering various topics. Full details at IIW 2008 wiki at http://iiw.idcommons.net/Notes_08b http://iiw.idcommons.net/Notes_08b Key involvement from Google, M/S, AOL and Yahoo 180 participants Focus was on using the technology in real market deployment. Google is pushing for taking OpenID in combination of other protocols main stream. Google is becomming an OpenID provider. Discovery is deemed to be very important. A 3.5 hour session was conducted on the topic led by Yahoo. Relation to XRDS, XRI and OAuth is important.
3
IIW 2008 Take home points..2 OAuth authors would like to standarize OAuth at the IETF as opposed to OASIS for various reasons: They do not feel that they will need to pay OASIS so that they can do their work They do work outside their companies as supporters of the work this means that their companies will not be interested in joining OASIS IPR issues need to be solved if they join a TC OASIS rule of having no more two individuals from a single company hinders the abililty of these individuals to join OASIS Some individulas can not afford the $300 fee to join OASIS. A BoF on OAuth was done at the November meeting of IETF A discussion list was established for OAuth Need to encage this community to get them to do work in IDTrust Discussions already started to get them at XRDS TC. Drummond to provide an update. Same problem occurs with the Open Web Foundation People. An OASIS wide policy is need to deal with the issue.
4
Important Sessions and impacts..1 Google OAuth & Federated Login Research see http://sites.google.com/site/oauthgoog/ http://sites.google.com/site/oauthgoog/ Goal is to give investigate how OAuth, OpenID, SAML, XRDS, SaaS, Strong/2ndFactorAuth, InformationCards, CardSpace, OpenSocial, Portable Contacts, WS-*, Geneva,.. technologies fit together Direct reserach on user login aspects and go to market strategies Requires IDTrust to focus on Social network aspects and OAuth in addition to XRI/XRDS. Google Strong Auth Usability and Demos was also covered see videos at http://sites.google.com/site/oauthgoog/UXFedLogin/strongauthvideos http://sites.google.com/site/oauthgoog/UXFedLogin/strongauthvideos
5
Important Sessions and impacts..2 Effort underway to standardize Portable Contacts – contact schema; discovery / auth; common operations – Focused on ease & speed of adoption – Active involvement from large & small players – More info & current draft spec: http://portablecontacts.nethttp://portablecontacts.net – IDTrust need to see what role it can play here
6
OpenID Authentication 2.1 2.0 has been finalized; bunch of implementations; found lots of spec bugs Core specification can support oauth and email addresses Current focus om making spec more readable, fixing bugs (eratta) and a security appendix Working on clarifying XRI Currently there's no firm message about whether RPs MUST support XRIs or not. Need to clarify how exactly XRI should be used with OpenID. Clarify if RPs can white or blacklist what OPs they accept, and vice-versa. Discovery of type of identifiers an RP supports. Updating discovery. Possibly including the XRD discovery. Clarifying whether association over SSL must/can use diffie-hellman. Exploratory work: Signature mechanisms. Looking at additionally supporting the mechanisms defined in OAuth so that they can be closer together. Possibly deprecating the current signature mechanism. Use of Public keys? Need coordination with them and see what they want to do with OpenID. Same participation problems like the OAuth
7
Browser Extension Convergence Quick inventory of the existing browser extensions: Firefox: Sxipper (OpenID, UN/PW), Higgins: HBX4FF (I-Card), OpenInfoCard (I-Card), DigitalMe (I-Card), OpenLiberty (SAML), Verisign Seatbelt (OpenID), IDIB (OpenID…) IE: Microsoft’s I-Card built-in, Higgins: HBX4IE A list of protocol “families” that each extension should support: Username/Password (Form-based, HTTP Auth, WS-Security) OpenID (OpenID, SAML); I-Card (ISIP‡IMI-TC) Kerberos; SAML (SAML SSO, SAML ECP) Browser-native add-on/extension/plug-in Flash, Java, Gears, Silverlight Browser Support for RP Auth Discovery Everyone agreed that creating common specs for this was a good idea. Could use XRDS as the basis for discovery of a relying party (RP) site’s authentication support for multiple protocols. The RP site would publish an XRDS document that would allow a “smart client” (well, a browser extension) to discover information about what protocols were supported and how they might be used to authenticate to the site. Possible new work in IDTRust
8
Need for a Common Terminology Exploring the Construction of Online Identity & Definition of Terms. IDTrust can take a lead role here. ITU-T has a current up to date document.
9
Conclusion Very Important event Need to keep involved OASIS was mentioned a lot in the meeting, the message is going forward to consider OASIS as an SDO Many opportunities to get involved Main obstacle is how this community can do their work in OASIS.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.